Security Awareness Training Incident Response Data Loss Prevention (DLP) Secure Socket Layer (SSL) Security Patch Access Control Intrusion Detection System (IDS) Endpoint Security Digital Footprint Security Incident Security Policy Phishing Awareness Patch Management Ransomware Penetration Testing Two-Factor Authentication (2FA) Security Audit Network Monitoring Authentication Password Strength Phishing Cyber Threat Security Breach Response Biometric Authentication Security Best Practices Cyber Hygiene Security Awareness Month Social Engineering Malware Firewall Intrusion Prevention System (IPS) Zero- Day Exploit Data Breach Vulnerability Multi-Factor Authentication (MFA) Network Security Firewall Configuration Information Security Encryption Denial of Service (DoS) Security Awareness Training Incident Response Data Loss Prevention (DLP) Secure Socket Layer (SSL) Security Patch Access Control Intrusion Detection System (IDS) Endpoint Security Digital Footprint Security Incident Security Policy Phishing Awareness Patch Management Ransomware Penetration Testing Two-Factor Authentication (2FA) Security Audit Network Monitoring Authentication Password Strength Phishing Cyber Threat Security Breach Response Biometric Authentication Security Best Practices Cyber Hygiene Security Awareness Month Social Engineering Malware Firewall Intrusion Prevention System (IPS) Zero- Day Exploit Data Breach Vulnerability Multi-Factor Authentication (MFA) Network Security Firewall Configuration Information Security Encryption Denial of Service (DoS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Awareness Training
Incident Response
Data Loss Prevention (DLP)
Secure Socket Layer (SSL)
Security Patch
Access Control
Intrusion Detection System (IDS)
Endpoint Security
Digital Footprint
Security Incident
Security Policy
Phishing Awareness
Patch Management
Ransomware
Penetration Testing
Two-Factor Authentication (2FA)
Security Audit
Network Monitoring
Authentication
Password Strength
Phishing
Cyber Threat
Security Breach Response
Biometric Authentication
Security Best Practices
Cyber Hygiene
Security Awareness Month
Social Engineering
Malware
Firewall
Intrusion Prevention System (IPS)
Zero-Day Exploit
Data Breach
Vulnerability
Multi-Factor Authentication (MFA)
Network Security
Firewall Configuration
Information Security
Encryption
Denial of Service (DoS)